IT Decision Checklist: Security Information and Event Management

IT Decision Checklist: Security Information and Event Management

As the complexity of the networks IT manages continues to increase, so too does the volume of security-related information generated by network devices. In fact, it is not unusual for a large firm to produce more log data than the entire printed collection of the Library of Congress, all before breakfast. In this climate, security information management (SIM) tools are increasingly critical in order to maintain control.

Access this edition of Information Security magazine for our experts' insights into choosing and successfully implementing SIM tools. Uncover the critical business and technical considerations involved in the selection process, including:

Integration with workflow and change management

Cost and staffing requirements

Alerting and reporting

Architecture and scalability

And more

Vendor:

HP Enterprise Security

Posted:

24 Feb 2012

Published:

23 Feb 2012

Format:

PDF

Length:

12 Page(s)

Type:

Ezine

Language:

English

Download Your Ezine Now!

More from Related TechTarget Sites

Microsoft's Windows 10 Enterprise makes Windows 8 seem like a distant memory. But should CIOs wait or take the bait? Also in Searchlight, Google uses sensors to fight pollution; Intel's new memory chip breakthrough.

Artificial intelligence has come a long way since SearchCIO columnist Harvey Koeppel studied with some of the discipline's pioneers. He offers 10 steps CIOs must take now to prepare for the AI technology era ahead.

How do organizations gain a competitive edge in today's rapidly evolving tech landscape? With a solid IT strategy plan to guide them, for starters. These IT strategy plan templates and samples will help.

Major IT companies like Black Hat and Google spoke out against the proposed Wassenaar Arrangement rules for cybersecurity software, and those protests have caused the U.S. Dept. of Commerce to commit to drafting new rules.

News roundup: New threats add to the Tor anonymity debate as a new browser aims to take anonymous browsing to the next level. Plus: Android security outlook bad -- or is it?; another Xen host escape flaw; Wassenaar revisions put on hold.